Index: content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
diff --git a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
index ae856ee7140136caf6454bd03fc4feae87c549e8..57e75e4c1fa9ab1974d0506564271f7ef1c5004d 100644 |
--- a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
+++ b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
@@ -114,7 +114,6 @@ ResultExpr AllowAllPolicy::EvaluateSyscall(int sysno) const { |
// If a BPF policy is engaged for |process_type|, run a few sanity checks. |
void RunSandboxSanityChecks(const std::string& process_type) { |
if (process_type == switches::kRendererProcess || |
- process_type == switches::kWorkerProcess || |
process_type == switches::kGpuProcess || |
process_type == switches::kPpapiPluginProcess) { |
int syscall_ret; |
@@ -180,8 +179,7 @@ bool StartBPFSandbox(const CommandLine& command_line, |
if (process_type == switches::kGpuProcess) { |
policy.reset(GetGpuProcessSandbox().release()); |
- } else if (process_type == switches::kRendererProcess || |
- process_type == switches::kWorkerProcess) { |
+ } else if (process_type == switches::kRendererProcess) { |
policy.reset(new RendererProcessPolicy); |
} else if (process_type == switches::kPpapiPluginProcess) { |
policy.reset(new PpapiProcessPolicy); |